There are several ways an organization or individual can be attacked through use of the software. Presently, list the most popular ways these attacks are being implemented? What defences are being executed?
Analyze the privacy concerns raised by collection of the personal data for mining purposes.
1) Choose and describe three (3) concerns raised by the consumers.
2) Decide if each of these concerns is valid and describe your decision for each.
3) Explain how each concern is being analyzed.